Sign up
Forgot password?
FAQ: Login

Tansley D. Using TCP Wrappers to control access

  • pdf file
  • size 54,18 KB
  • added by
  • info modified
Tansley D. Using TCP Wrappers to control access
IBM Corporation, 2011. – 16 p.
TCP Wrappers allows system administrators to control and log incoming TCP-based connections to the local host run from inetd.conf.
TCP wrappers, often called wrappers, can lock down popular TCP inbound clients on your AIX box quickly. Find out how wrappers can easily protect and secure your machines.
  • Sign up or login using form at top of the page to download this file.
  • Sign up
Up